<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>reverse engineering on </title>
    <link>https://b1872f9d.camati-site.pages.dev/tags/reverse-engineering/</link>
    <description>Recent content in reverse engineering on </description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Sun, 19 Apr 2026 17:36:49 -0300</lastBuildDate><atom:link href="https://b1872f9d.camati-site.pages.dev/tags/reverse-engineering/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Case Study 08 HTB Write-up Holmes 2025 5: The Payload Write-up Challenge</title>
      <link>https://b1872f9d.camati-site.pages.dev/posts/case-study-08/</link>
      <pubDate>Sun, 19 Apr 2026 17:36:49 -0300</pubDate>
      
      <guid>https://b1872f9d.camati-site.pages.dev/posts/case-study-08/</guid>
      <description>Holmes 2025 5: The Payload Write-up Description This is my write-up for the Sherlock Challange completed on 04/12 in the HTB challanges, bellow are my answers for the challange and how i got each flag.
Goal Analyze a stealthy malware sample that silently propagates across systems. Your task is to uncover its hidden logic, understand how it maintains persistence, and reveal the secret it’s designed to protect.
Scenario With the malware extracted, Holmes inspects its logic.</description>
    </item>
    
    <item>
      <title>Case Study 01 - Malware analysis</title>
      <link>https://b1872f9d.camati-site.pages.dev/posts/case-study-01/</link>
      <pubDate>Sun, 08 Sep 2024 23:08:50 -0300</pubDate>
      
      <guid>https://b1872f9d.camati-site.pages.dev/posts/case-study-01/</guid>
      <description>Malware analysis Since I started to learn about how computer works and how can we program it to do what we want, one thing has catch my attention: The assembly language and the power of reverse engineering. Reversing engineer something and having the knowledge of how it works internally so we can use this knowledge in our own projects or for our own understanding, is the clearly definition to &amp;ldquo;hack&amp;rdquo; something.</description>
    </item>
    
  </channel>
</rss>
